Cargando…

Summary of The 3rd Control System Cyber-Security (CS)2/HEP Workshop

Over the last decade modern accelerator and experiment control systems have increasingly been based on commercial-off-the-shelf products (VME crates, programmable logic controllers (PLCs), supervisory control and data acquisition (SCADA) systems, etc.), on Windows or Linux PCs, and on communica...

Descripción completa

Detalles Bibliográficos
Autor principal: Lüders, S
Lenguaje:eng
Publicado: 2011
Acceso en línea:http://cds.cern.ch/record/1564196
_version_ 1780930808061624320
author Lüders, S
author_facet Lüders, S
author_sort Lüders, S
collection CERN
description Over the last decade modern accelerator and experiment control systems have increasingly been based on commercial-off-the-shelf products (VME crates, programmable logic controllers (PLCs), supervisory control and data acquisition (SCADA) systems, etc.), on Windows or Linux PCs, and on communication infrastructures using Ethernet and TCP/IP. Despite the benefits coming with this (r)evolution, new vulnerabilities are inherited, too: Worms and viruses spread within seconds via the Ethernet cable, and attackers are becoming interested in control systems. The Stuxnet worm of 2010 against a particular Siemens PLC is a unique example for a sophisticated attack against control systems [1]. Unfortunately, control PCs cannot be patched as fast as office PCs. Even worse, vulnerability scans at CERN using standard IT tools have shown that commercial automation systems lack fundamental security precautions: Some systems crashed during the scan, others could easily be stopped or their process data being altered [2]. The 3rd (CS)2/HEP workshop [3] held the weekend before the ICALEPCS2011 conference was intended to raise awareness; exchange good practices, ideas, and implementations; discuss what works & what not as well as their pros & cons; report on security events, lessons learned & successes; and update on progresses made at HEP laboratories around the world in order to secure control systems. This presentation will give a summary of the solutions planned, deployed and the experience gained.
id cern-1564196
institution Organización Europea para la Investigación Nuclear
language eng
publishDate 2011
record_format invenio
spelling cern-15641962022-08-17T13:26:32Zhttp://cds.cern.ch/record/1564196engLüders, SSummary of The 3rd Control System Cyber-Security (CS)2/HEP WorkshopOver the last decade modern accelerator and experiment control systems have increasingly been based on commercial-off-the-shelf products (VME crates, programmable logic controllers (PLCs), supervisory control and data acquisition (SCADA) systems, etc.), on Windows or Linux PCs, and on communication infrastructures using Ethernet and TCP/IP. Despite the benefits coming with this (r)evolution, new vulnerabilities are inherited, too: Worms and viruses spread within seconds via the Ethernet cable, and attackers are becoming interested in control systems. The Stuxnet worm of 2010 against a particular Siemens PLC is a unique example for a sophisticated attack against control systems [1]. Unfortunately, control PCs cannot be patched as fast as office PCs. Even worse, vulnerability scans at CERN using standard IT tools have shown that commercial automation systems lack fundamental security precautions: Some systems crashed during the scan, others could easily be stopped or their process data being altered [2]. The 3rd (CS)2/HEP workshop [3] held the weekend before the ICALEPCS2011 conference was intended to raise awareness; exchange good practices, ideas, and implementations; discuss what works & what not as well as their pros & cons; report on security events, lessons learned & successes; and update on progresses made at HEP laboratories around the world in order to secure control systems. This presentation will give a summary of the solutions planned, deployed and the experience gained.oai:cds.cern.ch:15641962011
spellingShingle Lüders, S
Summary of The 3rd Control System Cyber-Security (CS)2/HEP Workshop
title Summary of The 3rd Control System Cyber-Security (CS)2/HEP Workshop
title_full Summary of The 3rd Control System Cyber-Security (CS)2/HEP Workshop
title_fullStr Summary of The 3rd Control System Cyber-Security (CS)2/HEP Workshop
title_full_unstemmed Summary of The 3rd Control System Cyber-Security (CS)2/HEP Workshop
title_short Summary of The 3rd Control System Cyber-Security (CS)2/HEP Workshop
title_sort summary of the 3rd control system cyber-security (cs)2/hep workshop
url http://cds.cern.ch/record/1564196
work_keys_str_mv AT luderss summaryofthe3rdcontrolsystemcybersecuritycs2hepworkshop